End-to-End Delay Bounds for Variable Length Packet Transmissions under Flow Transformations
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2015, Vol 1, Issue 3
Abstract
A fundamental contribution of network calculus is the convolution-form representation of networks which enables tight end-to-end delay bounds. Recently, this has been extended to the case where the data flow is subject to transformations on its way to the destination. Yet, the extension, based on so-called scaling elements, only applies to a setting of identically sized data units, e.g., bits. In practice, of course, one often has to deal with variable-length packets. Therefore, in this paper, we address this case and propose two novel methods to derive delay bounds for variable-length packets subject to flow transformations. One is a relatively direct extension of existing work and the other one represents a more detailed treatment of packetization effects. In a numerical evaluation, we show the clear superiority of the latter one and also validate the bounds by simulation results.
Authors and Affiliations
Hao Wang, Jens Schmitt
A Survey of Internet of Things Services Provision by Telecom Operators
Telecom industry will play a vital role in delivering Internet of Things (IoT) solutions and services. Researchers trust that IoT services deployment by Telecom is inevitable during the next few years. Nowadays, digital...
WE-Harvest: A Wearable Piezoelectric-Electromagnetic Energy Harvester
Wearable electronics require a sustainable electrical power supply to operate. Energy harvesting techniques can be used to convert available nonelectrical energy sources into electrical energy. This paper presents WE-Har...
A Tracing Toolset for Embedded Linux Flash File Systems
NAND flash memory integration in the traditional I/O software stack of Unix-like operating systems (OS) was achieved without modifying most of the OS layers. In fact, one can dissociate two categories of flash memory dev...
Device-to-Device Communications for 5G Internet of Things
The proliferation of heterogeneous devices connected through large-scale networks is a clear sign that the vision of the Internet of Things (IoT) is getting closer to becoming a reality. Many researchers and experts in t...
Securing Communication in MQTT enabled Internet of Things with Lightweight security protocol
This paper proposes a security algorithm for Internet of Things (IoT) using simple lightweight cryptographic operations. The main advantage of the proposed algorithm is the simplicity, energy efficiency and the speed of...